All of lore.kernel.org
 help / color / mirror / Atom feed
* [GIT PULL] Networking for 5.18-rc1
@ 2022-03-31 17:24 Jakub Kicinski
  2022-03-31 19:12 ` pr-tracker-bot
  0 siblings, 1 reply; 2+ messages in thread
From: Jakub Kicinski @ 2022-03-31 17:24 UTC (permalink / raw)
  To: torvalds; +Cc: kuba, davem, netdev, linux-kernel

Hi Linus!

The following changes since commit d717e4cae0fe77e10a27e8545a967b8c379873ac:

  Merge tag 'net-5.18-rc0' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net (2022-03-28 17:02:04 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git tags/net-5.18-rc1

for you to fetch changes up to 9d570741aec1e1ebd37823b34a2958f24809ff24:

  vxlan: do not feed vxlan_vnifilter_dump_dev with non vxlan devices (2022-03-31 08:53:01 -0700)

----------------------------------------------------------------
Networking fixes for 5.18-rc1 and rethook patches.

Features:

 - kprobes: rethook: x86: replace kretprobe trampoline with rethook

Current release - regressions:

 - sfc: avoid null-deref on systems without NUMA awareness
   in the new queue sizing code

Current release - new code bugs:

 - vxlan: do not feed vxlan_vnifilter_dump_dev with non-vxlan devices

 - eth: lan966x: fix null-deref on PHY pointer in timestamp ioctl
   when interface is down

Previous releases - always broken:

 - openvswitch: correct neighbor discovery target mask field
   in the flow dump

 - wireguard: ignore v6 endpoints when ipv6 is disabled and fix a leak

 - rxrpc: fix call timer start racing with call destruction

 - rxrpc: fix null-deref when security type is rxrpc_no_security

 - can: fix UAF bugs around echo skbs in multiple drivers

Misc:

 - docs: move netdev-FAQ to the "process" section of the documentation

Signed-off-by: Jakub Kicinski <kuba@kernel.org>

----------------------------------------------------------------
Alexei Starovoitov (3):
      Merge branch 'fprobe: Fixes for Sparse and Smatch warnings'
      Merge branch 'kprobes: rethook: x86: Replace kretprobe trampoline with rethook'
      Merge branch 'xsk: another round of fixes'

Andrii Nakryiko (1):
      selftests/bpf: fix selftest after random: Urandom_read tracepoint removal

David Howells (1):
      rxrpc: Fix call timer start racing with call destruction

Duoming Zhou (2):
      ax25: fix UAF bug in ax25_send_control()
      ax25: Fix UAF bugs in ax25 timers

Eric Dumazet (1):
      vxlan: do not feed vxlan_vnifilter_dump_dev with non vxlan devices

Geliang Tang (1):
      bpf: Sync comments for bpf_get_stack

Guangbin Huang (1):
      net: hns3: fix software vlan talbe of vlan 0 inconsistent with hardware

Hangyu Hua (3):
      can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path
      can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path
      can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path

Jakub Kicinski (17):
      Merge https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf
      Merge branch 'wireguard-patches-for-5-18-rc1'
      docs: netdev: replace references to old archives
      docs: netdev: minor reword
      docs: netdev: move the patch marking section up
      docs: netdev: turn the net-next closed into a Warning
      docs: netdev: note that RFC postings are allowed any time
      docs: netdev: shorten the name and mention msgid for patch status
      docs: netdev: rephrase the 'Under review' question
      docs: netdev: rephrase the 'should I update patchwork' question
      docs: netdev: add a question about re-posting frequency
      docs: netdev: make the testing requirement more stringent
      docs: netdev: add missing back ticks
      docs: netdev: call out the merge window in tag checking
      docs: netdev: broaden the new vs old code formatting guidelines
      docs: netdev: move the netdev-FAQ to the process pages
      Merge tag 'linux-can-fixes-for-5.18-20220331' of git://git.kernel.org/pub/scm/linux/kernel/git/mkl/linux-can

Jason A. Donenfeld (3):
      wireguard: queueing: use CFI-safe ptr_ring cleanup function
      wireguard: selftests: simplify RNG seeding
      wireguard: socket: ignore v6 endpoints when ipv6 is disabled

Jiri Olsa (1):
      bpftool: Fix generated code in codegen_asserts

Jonathan Lemon (1):
      ptp: ocp: handle error from nvmem_device_find

Maciej Fijalkowski (2):
      ice: xsk: Stop Rx processing when ntc catches ntu
      ice: xsk: Fix indexing in ice_tx_xsk_pool()

Magnus Karlsson (2):
      xsk: Do not write NULL in SW ring at allocation failure
      ice: xsk: Eliminate unnecessary loop iteration

Marc Kleine-Budde (2):
      can: m_can: m_can_tx_handler(): fix use after free of skb
      can: gs_usb: gs_make_candev(): fix memory leak for devices with extended bit timing configuration

Martin Habets (1):
      sfc: Avoid NULL pointer dereference on systems without numa awareness

Martin Varghese (1):
      openvswitch: Fixed nd target mask field in the flow dump.

Masami Hiramatsu (5):
      fprobe: Fix smatch type mismatch warning
      fprobe: Fix sparse warning for acccessing __rcu ftrace_hash
      kprobes: Use rethook for kretprobe if possible
      x86,rethook,kprobes: Replace kretprobe with rethook on x86
      x86,kprobes: Fix optprobe trampoline to generate complete pt_regs

Michael Walle (1):
      net: lan966x: fix kernel oops on ioctl when I/F is down

Milan Landaverde (1):
      bpf/bpftool: Add unprivileged_bpf_disabled check against value of 2

Oliver Hartkopp (1):
      can: isotp: restore accidentally removed MSG_PEEK feature

Paolo Abeni (3):
      Merge branch 'fix-uaf-bugs-caused-by-ax25_release'
      Merge branch 'docs-update-and-move-the-netdev-faq'
      Merge branch 'net-hns3-add-two-fixes-for-net'

Pavel Skripkin (1):
      can: mcba_usb: properly check endpoint type

Peter Zijlstra (1):
      x86,rethook: Fix arch_rethook_trampoline() to generate a complete pt_regs

Randy Dunlap (1):
      net: sparx5: uses, depends on BRIDGE or !BRIDGE

Stéphane Graber (1):
      openvswitch: Add recirc_id to recirc warning

Tom Rix (1):
      can: mcp251xfd: mcp251xfd_register_get_dev_id(): fix return of error value

Vinod Koul (1):
      dt-bindings: net: qcom,ethqos: Document SM8150 SoC compatible

Wang Hai (1):
      wireguard: socket: free skb in send6 when ipv6 is disabled

Xiaolong Huang (1):
      rxrpc: fix some null-ptr-deref bugs in server_key.c

Yonghong Song (1):
      selftests/bpf: Fix clang compilation errors

Yufeng Mo (1):
      net: hns3: fix the concurrency between functions reading debugfs

Yuntao Wang (1):
      bpf: Fix maximum permitted number of arguments check

Zheng Yongjun (1):
      net: dsa: felix: fix possible NULL pointer dereference

 Documentation/bpf/bpf_devel_QA.rst                 |   2 +-
 .../devicetree/bindings/net/qcom,ethqos.txt        |   4 +-
 Documentation/networking/index.rst                 |   3 +-
 Documentation/process/maintainer-handbooks.rst     |   1 +
 .../maintainer-netdev.rst}                         | 114 ++++++++++--------
 MAINTAINERS                                        |   1 +
 arch/Kconfig                                       |   8 +-
 arch/x86/Kconfig                                   |   1 +
 arch/x86/include/asm/unwind.h                      |  23 ++--
 arch/x86/kernel/Makefile                           |   1 +
 arch/x86/kernel/kprobes/common.h                   |   1 +
 arch/x86/kernel/kprobes/core.c                     | 107 -----------------
 arch/x86/kernel/kprobes/opt.c                      |  25 ++--
 arch/x86/kernel/rethook.c                          | 127 +++++++++++++++++++++
 arch/x86/kernel/unwind_orc.c                       |  10 +-
 drivers/net/can/m_can/m_can.c                      |   5 +-
 drivers/net/can/spi/mcp251xfd/mcp251xfd-core.c     |   2 +-
 drivers/net/can/usb/ems_usb.c                      |   1 -
 drivers/net/can/usb/gs_usb.c                       |   2 +
 drivers/net/can/usb/mcba_usb.c                     |  27 +++--
 drivers/net/can/usb/usb_8dev.c                     |  30 +++--
 drivers/net/dsa/ocelot/felix_vsc9959.c             |   4 +
 drivers/net/ethernet/hisilicon/hns3/hnae3.h        |   1 +
 drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c |  15 ++-
 drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.h |   1 -
 .../ethernet/hisilicon/hns3/hns3pf/hclge_main.c    |   6 +-
 drivers/net/ethernet/intel/ice/ice.h               |   2 +-
 drivers/net/ethernet/intel/ice/ice_xsk.c           |   5 +-
 .../net/ethernet/microchip/lan966x/lan966x_main.c  |   3 +
 drivers/net/ethernet/microchip/sparx5/Kconfig      |   1 +
 drivers/net/ethernet/sfc/efx_channels.c            |  11 +-
 drivers/net/vxlan/vxlan_vnifilter.c                |   6 +
 drivers/net/wireguard/queueing.c                   |   3 +-
 drivers/net/wireguard/socket.c                     |   5 +-
 drivers/ptp/ptp_ocp.c                              |  15 +--
 include/linux/kprobes.h                            |  51 ++++++++-
 include/trace/events/rxrpc.h                       |   8 +-
 kernel/Makefile                                    |   1 +
 kernel/bpf/btf.c                                   |   2 +-
 kernel/kprobes.c                                   | 124 ++++++++++++++++----
 kernel/trace/fprobe.c                              |   8 +-
 kernel/trace/trace_kprobe.c                        |   4 +-
 net/ax25/af_ax25.c                                 |  13 ++-
 net/can/isotp.c                                    |   2 +-
 net/openvswitch/actions.c                          |   4 +-
 net/openvswitch/flow_netlink.c                     |   4 +-
 net/rxrpc/ar-internal.h                            |  15 ++-
 net/rxrpc/call_event.c                             |   2 +-
 net/rxrpc/call_object.c                            |  40 ++++++-
 net/rxrpc/server_key.c                             |   7 +-
 net/xdp/xsk_buff_pool.c                            |   8 +-
 tools/bpf/bpftool/feature.c                        |   5 +-
 tools/bpf/bpftool/gen.c                            |   2 +-
 tools/include/uapi/linux/bpf.h                     |   8 +-
 .../selftests/bpf/prog_tests/get_stack_raw_tp.c    |   3 -
 .../selftests/bpf/progs/test_stacktrace_build_id.c |  12 +-
 tools/testing/selftests/bpf/test_lpm_map.c         |   3 +-
 tools/testing/selftests/wireguard/qemu/init.c      |  26 ++---
 58 files changed, 588 insertions(+), 337 deletions(-)
 rename Documentation/{networking/netdev-FAQ.rst => process/maintainer-netdev.rst} (75%)
 create mode 100644 arch/x86/kernel/rethook.c

^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: [GIT PULL] Networking for 5.18-rc1
  2022-03-31 17:24 [GIT PULL] Networking for 5.18-rc1 Jakub Kicinski
@ 2022-03-31 19:12 ` pr-tracker-bot
  0 siblings, 0 replies; 2+ messages in thread
From: pr-tracker-bot @ 2022-03-31 19:12 UTC (permalink / raw)
  To: Jakub Kicinski; +Cc: torvalds, kuba, davem, netdev, linux-kernel

The pull request you sent on Thu, 31 Mar 2022 10:24:23 -0700:

> git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git tags/net-5.18-rc1

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/2975dbdc3989cd66a4cb5a7c5510de2de8ee4d14

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2022-03-31 19:13 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-03-31 17:24 [GIT PULL] Networking for 5.18-rc1 Jakub Kicinski
2022-03-31 19:12 ` pr-tracker-bot

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.